USN-6704-2

See a problem?
Source
https://ubuntu.com/security/notices/USN-6704-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6704-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6704-2
Related
Published
2024-03-21T13:01:27.314839Z
Modified
2024-03-21T13:01:27.314839Z
Summary
linux-raspi vulnerabilities
Details

It was discovered that the NVIDIA Tegra XUSB pad controller driver in the Linux kernel did not properly handle return values in certain error conditions. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-23000)

Quentin Minster discovered that the KSMBD implementation in the Linux kernel did not properly handle session setup requests. A remote attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2023-32247)

Lonial Con discovered that the netfilter subsystem in the Linux kernel did not properly handle element deactivation in certain cases, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1085)

Notselwyn discovered that the netfilter subsystem in the Linux kernel did not properly handle verdict parameters in certain cases, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2024-1086)

It was discovered that a race condition existed in the SCSI Emulex LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF and re-scanning an HBA FCF table, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2024-24855)

References

Affected packages

Ubuntu:22.04:LTS / linux-raspi

Package

Name
linux-raspi
Purl
pkg:deb/ubuntu/linux-raspi@5.15.0-1049.52?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.15.0-1049.52

Affected versions

5.*

5.13.0-1008.9
5.15.0-1002.2
5.15.0-1003.3
5.15.0-1004.4
5.15.0-1005.5
5.15.0-1006.6
5.15.0-1008.8
5.15.0-1011.13
5.15.0-1012.14
5.15.0-1013.15
5.15.0-1014.16
5.15.0-1015.17
5.15.0-1016.18
5.15.0-1017.19
5.15.0-1018.20
5.15.0-1021.23
5.15.0-1022.24
5.15.0-1023.25
5.15.0-1024.26
5.15.0-1025.27
5.15.0-1026.28
5.15.0-1027.29
5.15.0-1028.30
5.15.0-1029.31
5.15.0-1030.32
5.15.0-1032.35
5.15.0-1033.36
5.15.0-1034.37
5.15.0-1035.38
5.15.0-1036.39
5.15.0-1037.40
5.15.0-1038.41
5.15.0-1040.43
5.15.0-1041.44
5.15.0-1042.45
5.15.0-1043.46
5.15.0-1044.47
5.15.0-1045.48
5.15.0-1046.49
5.15.0-1047.50
5.15.0-1048.51

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "linux-tools-5.15.0-1049-raspi": "5.15.0-1049.52",
            "linux-buildinfo-5.15.0-1049-raspi": "5.15.0-1049.52",
            "linux-raspi-headers-5.15.0-1049": "5.15.0-1049.52",
            "linux-headers-5.15.0-1049-raspi": "5.15.0-1049.52",
            "linux-image-5.15.0-1049-raspi-dbgsym": "5.15.0-1049.52",
            "linux-modules-extra-5.15.0-1049-raspi": "5.15.0-1049.52",
            "linux-image-5.15.0-1049-raspi": "5.15.0-1049.52",
            "linux-modules-5.15.0-1049-raspi": "5.15.0-1049.52",
            "linux-raspi-tools-5.15.0-1049": "5.15.0-1049.52"
        }
    ]
}